Role-Based Access Control Models
Computer
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Proceedings of the 11th USENIX Security Symposium
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Beyond Fear: Thinking Sensibly about Security in an Uncertain World
Beyond Fear: Thinking Sensibly about Security in an Uncertain World
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Personal Servers as Digital Keys
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
Security Policy Reconciliation in Distributed Computing Environments
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
DSM '04 Proceedings of the 1st international doctoral symposium on Middleware
A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures
IEEE Distributed Systems Online
Security Architecture for Service-Based Mobile Environments
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Omero: Ubiquitous User Interfaces in the Plan B Operating System
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Plan B: An Operating System for Ubiquitous Computing Environments
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Peer-to-Peer authentication with a distributed single sign-on service
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
III: Security applications: SESAME: The solution to security for open distributed systems
Computer Communications
Access control: principle and practice
IEEE Communications Magazine
Hi-index | 0.00 |
One aim of pervasive computing is to allow users to share their resources so that they seem to be part of a single pervasive computer. This is just an illusion, the result of the synergy between different systems and resources. SHAD, introduced in PerCom 2007, is the first architecture that offers actual Single Sign-On to avoid authentication obtrusiveness and maintain the illusion of a single, pervasive computer. This paper describes how SHAD allows users to securely share their resources in a easy, natural, and intuitive way. It also describes its role-based Human-to-Human architecture, the threat model, and the protocols involved. Last but not the least, it presents results of further evaluation for our working implementation.